Preferred Language
Articles
/
Mxdu9I8BVTCNdQwCtIHT
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. In this study, an overview of lightweight encryption algorithms, and methods, in addition, a modern technique for these algorithms also will be discussed. Besides, a survey for the algorithm that would use minimal power, require less time, and provide acceptable security to low-end IoT devices also introduced, Evaluating the results includes an evaluation of the algorithms reviewed and what was concluded from them. Through the review, we concluded that the best algorithms depend on the type of application used. For example, Lightweight block ciphers are one of the advanced ways to get around security flaws.

Scopus Crossref
View Publication
Publication Date
Tue Oct 01 2024
Journal Name
Renewable And Sustainable Energy Reviews
A critical review on the efficient cooling strategy of batteries of electric vehicles: Advances, challenges, future perspectives
...Show More Authors

View Publication
Scopus (59)
Crossref (70)
Scopus Clarivate Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun May 16 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education
Historical Review: Athletics and Heroic Sports Encouraged and Played at Islamic period and Greek
...Show More Authors

The paper is highlighting the athletics and heroic sports which encouraged and played at Greek and Islamic period. The paper is identifying the Islamic athletics and heroic sport and compare them with Greek sports, as it is the model of sports while the sport during the Islamic period was not undertaken by scientific researches or articles even in Wikipedia. Although, this period was encouraged and practice many sports such as archery, sword grappling and wrestling, equestrianism, jogging and running whereas there are many Arabic references revealed during the Islamic 610 A.D. while the Greek and Olympic was known at 732 A.D. The paper is followed the literature review and historical to shied a light scientifically about traditional sports

... Show More
Publication Date
Mon May 24 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
Historical Review: Athletics and Heroic Sports Encouraged and Played at Islamic period and Greek
...Show More Authors

The paper is highlighting the athletics and heroic sports which encouraged and played at Greek and Islamic period. The paper is identifying the Islamic athletics and heroic sport and compare them with Greek sports, as it is the model of sports while the sport during the Islamic period was not undertaken by scientific researches or articles even in Wikipedia. Although, this period was encouraged and practice many sports such as archery, sword grappling  and wrestling, equestrianism, jogging and running whereas there are many Arabic references revealed during the Islamic 610 A.D. while the Greek and Olympic was known at 732 A.D. The paper is followed the literature review and historical to shied a light scientifically about tradition

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 04 2025
Journal Name
Bylon Center For Humanities Studies
Amos Oz And His Status In Modern Hebrew Literature (Review Article)
...Show More Authors

This literary review addresses the status of the most famous Israeli writer, Amos Oz, through the analysis of relevant articles that highlight various aspects of his literary and political orientations, reflecting his ideological and social background. Oz's literature encompasses a mix of political orientations that many critics view as extreme, while others see them as moderate stances indicative of the author's awareness. And these are what strengthened his literary status in modern Hebrew literature.These trends emphasized the contribution of Oz's works to shaping Israeli cultural consciousness and reflect the challenges facing identity in multiple contexts. He was an advocate for equality between Palestinians and Israelis and

... Show More
View Publication
Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe

... Show More
Crossref (1)
Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Basrah Researches Sciences
Review article: Biodegradation of Pharmaceutical Pollutants: Challenges, Mechanisms, and Environmental Implications
...Show More Authors

The emergence of such widespread pharmaceuticals as a pollutant has become one of the world's critical environmental problems that may lead to both the public's health and biodiversity deterioration. This article provides an exhaustive account of the current understanding of the environmental persistence of pharmaceutical contaminants following in-depth analysis of the additive effects of existing natural biodegradation pathways on the human health impact of these drugs. Paying special attention to biodegradation decomposing agents such as bacteria, fungi, and algae the paper estimates their ability to convert drug ingredients to compound that is eventually less toxic. Although these biologic systems contain an enormous potential fo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Review on Heat Transfer Process Inside Open and Closed Porous Cavity
...Show More Authors

Many researchers used different methods in their investigations to enhance the heat transfer coefficient, one of these methods is using porous medium. Heat transfer process inside closed and open cavities filled with a fluid-saturated porous media has a considerable importance in different engineering applications, such as compact heat exchangers, nuclear reactors and solar collectors. So, the present paper comprises a review on natural, forced, and combined convection heat transfer inside a porous cavity with and without driven lid. Most of the researchers on this specific subject studied the effect of many parameters on the heat transfer and fluid field inside a porous cavity, like the angle of inclination, the presenc

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Journal Of New Theory
Brief review of soft sets and its application in coding theory
...Show More Authors

In this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.

Publication Date
Wed Jan 10 2024
Journal Name
The American Journal Of Interdisciplinary Innovation And
SUBJECT REVIEW PHASES OF SUGAR METABOLISM AND THE EFFECT OF HORMONES
...Show More Authors